JavaScript Menu Courtesy of
Stevens Computer Science Engineering & Science Stevens Computer Science
Stevens Institute of Technology Stevens Computer Science Homepage Stevens Computer Science Homepage
Stevens CS
Mission Statement
News & Events
Success Stories

gray gray Share/Save/Bookmark
Stevens CS
Seminar List
Untitled Document

December 1, 2008

Controlling Timing Channels in Multithreaded Programs

Speaker: Alejandro Russo Chalmers University of Technology, Gothenburg, Sweden

Time: Monday, Dec 1, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Dave Naumann

Abstract: The problem of controlling information flow in multithreaded programs remains an important open challenge.A major difficulty for tracking information flow in concurrent programs is due to the internal timing covert channel. Information is leaked via this channel when secrets affect the timi more

For more information please contact:

David Naumann
Room 301
Phone: 201.216.5608
Fax: 201.216.8249

November 24, 2008

Authenticated Communication in Dynamic Federated Systems

Speaker: Nelly Fazio Department of Computer Science City University of New York City College and Graduate Center

Time: Monday, Nov 24, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Wendy Hui Wang

Abstract: System F6 is a DARPA program to increase the value and flexibility of future satellite missions. To this aim, the F6 initiative suggests replacing the monolithic architecture of current spacecrafts with a cluster of small specialized satellites. Re more

November 17, 2008

Socially-Aware Recommendations in Collaborative Tagging Sites

Speaker: Sihem Amer-Yahia Senior Research Scientist, Yahoo! Research - NYC

Time: Monday, Nov 17, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Wendy Hui Wang

Abstract: Collaborative tagging sites constitute a unique opportunity for leveraging implicit and explicit social ties in search and recommendations. This talk describes our work in the context of Royal Jelly, a platform for socially-aware recommendations in collaborative tagging sites. The key aspects more

November 10, 2008

PhotoSketch: Photo-Centric Urban 3D Modeling Tool

Prof. George Wolberg Department of Computer Science City College of New York New York, NY 10031

Monday, Nov 10, 2PM Babbio 221, Stevens Institute of Technology

Abstract: Geospatial navigation tools such as Google Earth and Microsoft Virtual Earth are exceedingly popular applications for exploring massive datasets. Their explosive growth provides impetus for photorealistic 3D modeling of urban scenes. Although laser range scanners are traditional sources for detailed 3D model more

November 3, 2008

Secure Detection of Policy Conflicts in a Multi-Organizational Collaborative Environment

Prof. Basit Shafiq Rutgers University

Monday, Nov 3, 2PM Babbio 221, Stevens Institute of Technology

Abstract In a collaborative environment, it is often the case that multiple autonomous organizations work together to accomplish a task. However, each collaborating organization may have its own predefined set of business policies, where some of them may be sensitive in nature. For example, as a policy, each organization taking part in the collaboration may have a negative l more

October 27, 2008

Scaling up Cognitive Radio

Prof. Joe Mitola, Stevens Institute of Technology

Monday, Oct 27, 2pm - 3pm Babbio 221, Stevens Institute of Technology

Abstract Cognitive radio technology improves spectrum efficiency via radio etiquettes in which a cognitive radio detects and avoids legacy radios as well as finding and using unoccupied spectrum dynamically. As the complexity of these air interfaces continues to increase, so does the cost of maintaining the related signal processing software. This talk present more

October 23, 2008

Computational Aided Engineering Work and Strategy at Honda R&D

Thomas Ramsay Honda R&D Americas, Inc. Vehicle Research Division

Oct 23, 2008, 2PM-3PM Babbio Room 110 Host: Quynh Dinh (

Abstract: With the continual increase in computer speed and the shrinking of the business development cycle, computer aided engineering (CAE) has become more and more prominent and more useful in the automotive industry. From pedestrian safety to bumper performance to interior comfort to fuel economy, computational solutions are h more

October 20, 2008

The Role Mining Problem - A Formal Perspective

Prof. Jaideep Vaidya Rutgers University

Monday, Oct 20, 2pm - 3pm Babbio 221, Stevens Institute of Technology

Abstract: Role based access control is well accepted as the standard best practice for access control within applications and organizations. Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. The essential question is how to devise a complete and corr more

October 15, 2008

Keystroke Authentication and Human-Behavior Driven Bot Detection

Prof. Danfeng Yao Rutgers University

Wednesday, Oct 15, 2008, 3PM-4PM Babbio Room 110

Abstract: Most of existing botnet detection solutions focuses on using the characteristic behaviors of botnets to identify malicious activities. We argue that there are intrinsic and fundamental differences between how human or a bot uses and reacts to a computer, which can be leveraged to distinguish human from bots and to detect infected hosts. We take the first step in formalizing and u more

October 6, 2008

Optical Filtering Directly in the Scene

Prof. Yves Jean ( City University of NY, Lehman College

Monday, Oct 6, 2:00PM Babbio 221, Stevens Institute of Technology

Abstract: Computer vision researchers have long sought algorithms for scene interpretation built upon detecting features in images that relate toscene composition. Yet much of the rich scene information is lost in the image formation process. A more powerful scheme would apply feature detection directly in the scene, measuring more

September 29, 2008

Fast Exact and Heuristic Methods for Role Minimization Problems

Dr. William Horne, Secure Systems Lab, HP Labs, Princeton, NJ

Monday, September 29, 2:00PM Babbio 221, Stevens Institute of Technology

Abstract: We describe several new bottom-up approaches to problems in roleengineering for Role-Based Access Control (RBAC). The salient problems are all NP-complete, even to approximate, yet we find that in instances that arise in practice, these problems can be solved in minutes. We first consider role minimization, the process of finding a smal more

September 22, 2008

Remote Data Checking

Prof. Reza Curtmola New Jersey Institute of Technology, NJ

Monday, September 22, 2008, 2:00PM Babbio Room 221 Stevens Institute of Technology

Abstract: Faced with cost and regulatory considerations, many companies are outsourcing the storage of their data to third parties. Outsourcing data storage achieves economies of scale for the management of storage and avoids the large initial investment to set up data enters. Recently, many such online archival systems have emerged fr more

September 15, 2008

Internet Situation Awareness: The Global View

Prof. Norbert Pohlmann if(is) – Institute for Internet Security, University of Applied Sciences Gelsenkirchen, Germany

Monday, September 15, 2008, 2:00PM Babbio Room 221 Stevens Institute of Technology

Abstract: Our vision is to generate a multidisciplinary continuous situation-awareness in a Private-Public-Partnership to provide all relevant stakeholders with their individual global view of the Internet. To generate this "Internet Situation Awareness" inp more

September 8, 2008

Data Integration with Uncertainty

Dr. Xin (Luna) Dong AT&T Research, Florham Park, NJ

Monday, Sept 8, 2008, 2:00 PM, Babbio Room 221 Stevens Institute of Technology

Abstract Many data management applications, such as managing enterprise data, scientific data, personal data, and integrating data on the web, need to manage a multitude of data sources. These data sets can be highly heterogeneous, describing the same domain using different schemas. To enable data sharing across heterogeneous sources, data integrati more

April 15, 2008

Transparent Anonymization: Thwarting Adversaries Who Know the Algorithm

Xiaokui Xiao Chinese University of Hong Kong

Tuesday, April 15, 2008, 11:00AM Babbio 304 Stevens Institute of Technology

Abstract The digitization of our daily lives has led to unprecedented collections of sensitive personal data (e.g., census data, medical records) by governments and corporations. Such data is often released for research purposes, which, however, may pose a risk to individual privacy. To address this issue, numerous techniques have been proposed to anonym more

April 3, 2008

An Online Learning Approach to Edge Matching

Yanghai Tsin Siemens Corporate Research

Thursday, April 3, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract Except in rare tightly controlled environments, many sophisticated computer vision algorithms can hardly survive the harsh visual world and its dynamic variations. Difficult to model visual scenes, imprecise sensor models, and spurious filter responses can easily contribute to failure of an otherwise mathematically elegant vision algorithm. The problem grows even more

March 31, 2008

Decentralized Access Control: The Case of Synchronous Communication and other Topics

Constantin Serban Rutgers University

Monday, March 31, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract The dependability and security of modern distributed systems, such as those supporting medical institutions and commercial enterprises, require increasingly sophisticated access control mechanisms that can impose global, enterprise-wide policies. Such policies should be sensitive to the history of interaction, and should be enforced in a scalable manner. more

March 27, 2008

Interaction-Oriented Programming

Yu David Liu Johns Hopkins University

Thursday, March 27, 11am Babbio 304 Stevens Institute of Technology

Abstract One might have the skills to build a garage, but will the same skills suffice for building a skyscraper? Research on software construction is not new, but scale changes everything. Next-generation software systems can easily grow into billions of lines of code. Hundreds of inter-dependent platforms, sensors, and devices are commonly involved. Continuous evolutio more

March 10, 2008

Infusing Usability Into Security Through Natural Language

Umut Topkara

Monday, March 10, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract Passwords are still the first line of defense in many computer systems, hence they have a critical place among the security vulnerabilities that involve human aspects. In the first part of the talk, I will present a scheme that reconciles the apparent contradictory requirements from most password policies: That the password should be random, and that it should be memorized and never written more

March 6, 2008

Structure from Data

Philippos Mordohai University of Pennsylvania

Thursday, March 6, 11:00AM Babbio 304 Stevens Institute of Technology

Abstract Obtaining structure from data is a fundamental problem in computer science. In computer vision, specifically, structure inference is especially challenging due to the loss of a dimension as the 3D world is projected on images. In the first part of the talk, I will present a fundamental approach for perceptual organization that is very robust despite more

March 3, 2008

Interface Safety in Multilingual Software

Gang Tan Boston University

Monday, March 3, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract Most real-world software systems consist of software components developed in different programming languages. For example, Sun's Java Development Kit 1.6 (JDK) contains around 2 million lines of Java code as well as 800,000 lines of C/C++ code. Unfortunately, the interface code that glues multilingual software components is a constant source of software bugs and vu more

February 28, 2008

MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition

Yun Mao University of Pennsylvania

Thursday, February 28, 11:00AM Babbio 304 Stevens Institute of Technology

Abstract The Internet faces new challenges, ranging from unwanted or harmful traffic to the increasing complexity and fragility of inter-domain routing. At the same time, new applications demand evolution for new capabilities such as mobility, content-based routing, and quality-of-service (QoS) routing. Overlay networks use the existing Internet to provide connectivity more

February 25, 2008

Visual Recognition in the Three-dimensional World

Silvio Savarese University of Illinois at Urbana-Champaign

Monday, February 25, 11:00AM Pierce 216 Stevens Institute of Technology

Abstract The ability to interpret the semantic of objects and actions, their individual geometric attributes as well as their spatial and temporal relationships within the environment is essential for an intelligent visual system and extremely valuable in numerous applications. In visual recognition, the problem of categorizing generic objects is a hi more

February 21, 2008

Improving Privacy in Distributed Constraint Optimization

Rachel Greenstadt Harvard University

Thursday, February 21, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract Computers increasingly act as autonomous agents entrusted with critical tasks, sensitive data, and interactions with with other humans and machines in large, multi-agent systems. These systems often require the agents to negotiate solutions to constraint optimization problems, such as resource allocation, supply-chain negotiation, and meeting scheduling. more

February 19, 2008

Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions

Seny Kamara Johns Hopkins University

Tuesday, February 19, 11:00AM Babbio 110 Stevens Institute of Technology

Abstract Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed. In this talk we will review existing security defin more

February 15, 2008

Category Classification using Proximity Distribution Kernels and Histogram Similarity using EMD-L1

Haibin Ling Siemens

Friday, February 15, 11:00AM Babbio 310 Stevens Institute of Technology

Abstract In this talk I will introduce my work on two topics, category classification and histogram comparison. Geometric context contains very rich information for category classification tasks. We propose using proximity distribution kernels (PDK) to robustly capture co-occurrence statistics of vector-quantized local features. As a Mercer kernel, PDK is naturally combined with a support more

February 14, 2008

Practical Dynamic Software Updating

Iulian Neamtiu University of Maryland, College Park

Thursday, February 14, 11am Babbio 110 Stevens Institute of Technology

Abstract Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic Software Updating (DSU) addresses this difficulty by permitting programs to be updated while they run. DSU is appealing compared to other approaches for on-line upgrades because it is general, more

February 7, 2008

An Adaptive Systems Perspective on Network Calculus, with Applications to Autonomic Control

Simon Dobson Systems Research Group UCD Dublin Ireland

Thursday, February 7 , 11:00AM Babbio 221 Stevens Institute of Technology

Abstract Autonomic communications systems must demonstrate behaviour that remains correct under a range of environmental conditions. In order to gain confidence that a system will behave as intended, it is advantageous to have a formal description of the expected behaviour that can be analysed and tested for compliance with different stimuli. We de more

January 14, 2008

Policies and Mechanisms for Secure Information Flow in the Presence of Cryptographic Operations

Aslan Askarov Chalmers University of Technology

Monday, January 14, 2:00PM Babbio 304 Stevens Institute of Technology

Abstract Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterference-based) information-flow definitions allow no flow from secret to public data. Unfortunately, this implies that programs with encryption are ruled out because encrypted output depend more

Stevens CS

gray gray Share/Save/Bookmark

Daniel Duchamp
Research Professor & Department Director
Room 313
Phone: 201.216.5390
Fax: 201.216.8249

Dawn Garcia
Administrative Assistant
Room 317
Phone: 201.216.5578
Fax: 201.216.8249

Sherry Dorso
Assistant to the Director
Lieb 317
Phone: 201.216.5328
Fax: 201.216.8249

Stevens CS
Stevens CS Stevens CS Stevens CS
View my Iframe Content